Compare two images and display differences (experimental)
docker scout compare
, docker scout diff
Name | Type | Default | Description |
---|---|---|---|
-e , --exit-code |
Return exit code '2' if vulnerability changes are detected | ||
--format |
string |
text |
Output format of the generated vulnerability report: - text: default output, plain text with or without colors depending on the terminal - markdown: Markdown output |
--ignore-base |
Filter out CVEs introduced from base image | ||
--ignore-unchanged |
Filter out unchanged packages | ||
--only-fixed |
Filter to fixable CVEs | ||
--only-package-type |
stringSlice |
Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) | |
--only-severity |
stringSlice |
Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by | |
--only-unfixed |
Filter to unfixed CVEs | ||
-o , --output |
string |
Write the report to a file. | |
--platform |
string |
Platform of image to analyze | |
--ref |
string |
Reference to use if the provided tarball contains multiple references. Can only be used with --type archive. |
|
--to |
string |
Image, directory or archive to compare to | |
--to-latest |
Latest image processed to compare to | ||
--to-ref |
string |
Reference to use if the provided tarball contains multiple references. Can only be used with --type archive. |
|
--to-stream |
string |
Name of stream to compare to | |
--to-type |
string |
image |
Type of the image to analyze. Can be one of: - image - oci-dir - archive (docker save tarball) |
--type |
string |
image |
Type of the image to analyze. Can be one of: - image - oci-dir - archive (docker save tarball) |
The docker scout compare
command analyzes two images and displays a comparison of both.
This command is experimental and its behaviour might change in the future
The main usage is to compare two versions of the same image. For instance when a new image is built and compared to the version running in production.
If no image is specified, the most recently built image will be used.
The following artifact types are supported:
- Images
- OCI layout directories
- Tarball archives, as created by
docker save
The tool analyzes the provided software artifact, and generates a vulnerability report.
By default, the tool expects an image reference, such as:
redis
curlimages/curl:7.87.0
mcr.microsoft.com/dotnet/runtime:7.0
If the artifact you want to analyze is an OCI directory or a tarball archive, you must use the --type
or --to-type
flag.
$ docker scout compare --to namespace/repo:latest
$ docker scout compare --ignore-base --to namespace/repo:latest namespace/repo:v1.2.3-pre
$ docker scout compare --format markdown --to namespace/repo:latest namespace/repo:v1.2.3-pre
$ docker scout compare --only-package-type maven --only-severity critical --to namespace/repo:latest namespace/repo:v1.2.3-pre